Forwarded from Infosec Fortress
Zhang Yunhai - BYPASS CONTROL FLOW GUARD COMPREHENSIVELY - Blackhat
#binary
#exploitation
———
🆔 @Infosec_Fortress
#binary
#exploitation
———
🆔 @Infosec_Fortress
❤5👍3
Forwarded from Infosec Fortress
The Kernel Hacker's Guide to the Galaxy
Automating Exploit Engineering Workflows
H2HC 2024
#binary
#kernel
#exploitation
———
🆔 @Infosec_Fortress
Automating Exploit Engineering Workflows
H2HC 2024
#binary
#kernel
#exploitation
———
🆔 @Infosec_Fortress
👍3
Forwarded from Infosec Fortress
Connor McGarr’s Blog
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
Dealing with Virtualization-Based Security (VBS), Hypervisor-Protected Code Integrity (HVCI), and Kernel Control Flow Guard (kCFG).
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
🔗 Link
#binary
#exploitation
#windows
#hvci
———
🆔 @Infosec_Fortress
🔗 Link
#binary
#exploitation
#windows
#hvci
———
🆔 @Infosec_Fortress
👍3🤣1
Forwarded from Infosec Fortress
Qrious Secure
Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991
Introduction Hi, I am Trung (xikhud). Last month, I joined Qrious Secure team as a new member, and my first target was to find and reproduce the security bugs that @bienpnn used at the Pwn2Own Vancouver 2023 to escape the VirtualBox VM.
Since VirtualBox is…
Since VirtualBox is…
Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991
🔗 Link
#binary
#exploitation
#virtualbox
#pwn2own
#cve
#CVE_2023_21987
#CVE_2023_21991
———
🆔 @Infosec_Fortress
🔗 Link
#binary
#exploitation
#virtualbox
#pwn2own
#cve
#CVE_2023_21987
#CVE_2023_21991
———
🆔 @Infosec_Fortress
Forwarded from Infosec Fortress
Doyensec
!exploitable Episode Two - Enter the Matrix
In case you are just tuning in, Doyensec has found themselves on a cruse ship touring the Mediterranean. Unwinding, hanging out with colleagues and having some fun. Part 1 covered our journey into IoT ARM exploitation, while our next blog post, coming in…
🔥3❤2👍2
Forwarded from Cafe Security (Mohammad)
Architecture Analysis of VMProtect 3.8
The focus will be on the new architecture for the latest VMProtect and techniques for attacking or reversing protected binaries. I will demonstrate how reverse engineering techniques—such as symbolic execution and binary instrumentation—can facilitate the de-virtualization or de-obfuscation of the protected code.
https://youtu.be/IMUUjTJzmFI?si=I02CASpsIo_w6G1B
#binary
#reverse
#vmp
#conference
@cafe_security
The focus will be on the new architecture for the latest VMProtect and techniques for attacking or reversing protected binaries. I will demonstrate how reverse engineering techniques—such as symbolic execution and binary instrumentation—can facilitate the de-virtualization or de-obfuscation of the protected code.
https://youtu.be/IMUUjTJzmFI?si=I02CASpsIo_w6G1B
#binary
#reverse
#vmp
#conference
@cafe_security
❤5
Forwarded from Infosec Fortress (Amir M. Jahangirzad)
SSTIC2025_Slides_windows_kernel_shadow_stack_mitigation_aulnette.pdf
2.8 MB
Analyzing the Windows kernel shadow stack mitigation
#slides
#binary
#windows
#exploitation
#shadow_stack
———
🆔 @Infosec_Fortress
#slides
#binary
#windows
#exploitation
#shadow_stack
———
🆔 @Infosec_Fortress
❤5